To see the other types of publications on this topic, follow the link: Network Systems of Comprehensive Assessment.

Journal articles on the topic 'Network Systems of Comprehensive Assessment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Network Systems of Comprehensive Assessment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yakymchuk, N. M., and A. I. Toroshanko. "METHODS OF IDENTIFICATION AND COMPREHENSIVE DIAGNOSIS OF TELECOMMUNICATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 69 (2020): 58–65. http://dx.doi.org/10.17721/2519-481x/2020/69-06.

Full text
Abstract:
The article formulates the main tasks of management of information networks and telecommunications services in terms of ensuring their reliable operation. The telecommunication network is considered as a complex system consisting of many components, each of which has its own characteristics of operation during operation. The main functions of the telecommunication network control system are determined: fault detection and network status diagnostics, network device administration, forecasting and elimination of congestion and other possible deviations in network functioning, ensuring coordinate
APA, Harvard, Vancouver, ISO, and other styles
2

Budzyński, Marcin, Jacek Szmagliński, Kazimierz Jamroz, Krystian Birr, Sławomir Grulkowski, and Joanna Wachnicka. "Assessing Tram Infrastructure Safety Using the Example of the City of Gdańsk." Journal of KONBiN 49, no. 3 (2019): 293–322. http://dx.doi.org/10.2478/jok-2019-0060.

Full text
Abstract:
Abstract Analysis of Gdańsk tram network statistics shows that incidents are quite frequent (about 650 within five years) and mostly involve collisions and crashes. As well as reducing the tram systems’ efficiency and reliability, incidents have a negative effect on road safety. As Polish cities extend their tram networks, they must also ensure that their existing networks are safe. This is to be achieved by conducting safety assessments. The article presents different assessment methods, at different stages of tram infrastructure lifecycle, providing a basis for a comprehensive diagnosis and
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Tameemi, M. M. A., A. A. H. Alzaghir, and M. A. M. Alsweity. "Comprehensive Review of Deep Learning in Intrusion Detection Systems." Proceedings of Telecommunication Universities 11, no. 3 (2025): 72–86. https://doi.org/10.31854/1813-324x-2025-11-3-72-86.

Full text
Abstract:
Deep learning methods play a crucial role in enhancing the effectiveness of intrusion detection systems. This study presents a comparative analysis of seven deep learning models, including autoencoders, restricted Boltzmann machines, deep belief networks, convolutional and recurrent neural networks, generative adversarial networks, and deep neural networks. The primary focus is on accuracy, precision, and recall metrics, evaluated using the NSL-KDD dataset. The analysis demonstrated the high effectiveness of recurrent neural networks, which achieved an accuracy of 99.79 %, precision of 99.67 %
APA, Harvard, Vancouver, ISO, and other styles
4

Chakkarapani Sumathi, Thilagasree, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, Pragathi Subramaniam, and Daekook Kang. "A comprehensive decision assessment for trust evaluation in wireless sensor networks." Yugoslav Journal of Operations Research, no. 00 (2024): 11. http://dx.doi.org/10.2298/yjor240217011c.

Full text
Abstract:
Objective: This study endeavors to tackle the pressing issue of network security within Wireless Sensor Networks (WSNs) through the introduction of an innovative integrated Pythagorean fuzzy-based method for evaluating network nodes. The primary aim is to enrich decision making frameworks within WSNs by furnishing a robust methodology for identifying and eradicating malevolent nodes. Methods: investigation employs an integrated Pythagorean fuzzy-based methodology to appraise network nodes by scrutinizing specific trust attributes. Comparative assessment with alternative contemporary Multiple C
APA, Harvard, Vancouver, ISO, and other styles
5

Carneiro, Joana, Dália Loureiro, Marta Cabral, and Dídia Covas. "Comprehensive Resilience Assessment Framework for Water Distribution Networks." Water 16, no. 18 (2024): 2611. http://dx.doi.org/10.3390/w16182611.

Full text
Abstract:
A novel comprehensive resilience assessment framework for drinking water systems is proposed integrating different resilience perspectives (i.e., robustness, autonomy, flexibility, reliability, preparedness and recovery), oriented by objectives, criteria and metrics, applicable at the tactical level. The resilience assessment framework is applied to a Portuguese real water distribution network, enabling the evaluation of the system’s resilience. The infrastructure dimension is the main contributor to the low resilience results, particularly in terms of infrastructural robustness, as the infras
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Qing Jian, and Zuo Min Wen. "Complex Social-Ecological Systems Network:New Perspective on the Sustainability." Advanced Materials Research 361-363 (October 2011): 1467–71. http://dx.doi.org/10.4028/www.scientific.net/amr.361-363.1467.

Full text
Abstract:
The complex social-ecological systems network is an integrative platform of ecology, economy, management and complex networks which providing a new perspective on the comprehensive management of ecological and socio economical processes. Through research of the structures, functions and processes, one four-dimensional conceptual model of the complex social-ecological system for sustainable development was set up. The complex social-ecological systems comprise of natural subsystem, social subsystem, economic subsystem and integrative decision subsystem. The complex social-ecological systems net
APA, Harvard, Vancouver, ISO, and other styles
7

Raenu, Raenu, Suhas Gupta, Shashikant Patil, Jaymeel Shah, Abhinav Mishra, and N. Gobi. "Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems." Journal of Intelligent Systems and Internet of Things 13, no. 2 (2024): 35–51. http://dx.doi.org/10.54216/jisiot.130203.

Full text
Abstract:
This research introduces an advanced network security methodology based on IoT, combining five innovative algorithms: Dynamic Threat Detection (DTD), Adaptive Intrusion Prevention System (AIPS), Anomaly-Based Security Metrics (ABSM), Context-Aware Firewall (CAF), and Cognitive Security Assessment (CSA). Each algorithm contributes specific functionalities, ranging from real-time threat detection and adaptive policy adjustments to anomaly quantification, contextual rule modifications, and holistic security risk assessments. The ablation study conducted on each algorithm reveals critical componen
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Buxiang, Yating Cai, Tianlei Zang, Jiale Wu, Binjie Sun, and Shi Chen. "Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances." Applied Sciences 13, no. 6 (2023): 3452. http://dx.doi.org/10.3390/app13063452.

Full text
Abstract:
With the development of communication technology, traditional distribution networks have gradually developed into cyber–physical systems (CPSs), from which the cyber system provides more protection for the grid and brings new security threat–cyber disturbances. Current research cannot scientifically measure the impact of cyber disturbances on the system and lacks reliability indices for a comprehensive quantitative assessment of CPS reliability from the perspective of cyber–physical fusion. If the impact of information disturbances on system reliability is not assessed accurately, it will not
APA, Harvard, Vancouver, ISO, and other styles
9

Teng, Tangyong, Yu Huang, Juan Wang, Zhukun Li, and Yonghua Chen. "Risk Assessment Method for Distributed Power Distribution Networks Considering Network Dynamic Reconstruction." Elektronika ir Elektrotechnika 30, no. 4 (2024): 26–34. http://dx.doi.org/10.5755/j02.eie.38195.

Full text
Abstract:
A new safety assessment framework has been proposed to address the operational risks of the integration of wind power and photovoltaic grid, which integrates the characteristics of distributed power sources with the dynamic reconfiguration requirements of the distribution grid. The framework comprehensively considers the impacts of wind power and photovoltaic output uncertainties, as well as load fluctuations, on the stability of the distribution grid. It also evaluates the safety under different operational states of the distribution grid. Using Halton sequence sampling technology to accurate
APA, Harvard, Vancouver, ISO, and other styles
10

Bai, Jiujun, and Xuebo Chen. "A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks." Sustainability 16, no. 6 (2024): 2399. http://dx.doi.org/10.3390/su16062399.

Full text
Abstract:
Security assessment of ironmaking plants is one of the crucial means to promote their sustainable development. However, the disparate nature of subsystems within these plants, along with network inconsistencies and isolated data, obstruct a thorough and timely security assessment. At the same time, it is impossible to achieve the sustainable development goals of reducing the adverse impact of safety on the environment, ensuring economic benefits and the health of employees. This study addresses the complexities of heterogeneous networks, disparate systems, and segregated data that are prevalen
APA, Harvard, Vancouver, ISO, and other styles
11

Liu, Zhenliang, Chi Zhang, Xinru Ran, Hang Zhou, Kun Fang, and Weigang Zhao. "Integrated Redundancy Assessment of Highway Bridge Network Systems Subjected to Emergencies." Earthquake Engineering and Resilience 4, no. 1 (2025): 61–75. https://doi.org/10.1002/eer2.109.

Full text
Abstract:
ABSTRACTAs arteries of transportation infrastructure, highway bridge networks (HBNs) are essential for normal residential and commercial activities yet are susceptible to natural or man‐made disasters. Their redundancy during emergencies is crucial for effective disaster mitigation and management. To address that, this study explores the ability of HBNs to independently withstand and recover from emergency events. A system‐level emergency response simulation method is proposed, integrating seismic hazard analysis, network configurations, traffic data, physical damage to regional bridges, and o
APA, Harvard, Vancouver, ISO, and other styles
12

Castañon, Ugo N., Paulo J. G. Ribeiro, and José F. G. Mendes. "Evaluating Urban Bikeability: A Comprehensive Assessment of Póvoa de Varzim’s Network." Sustainability 16, no. 21 (2024): 9472. http://dx.doi.org/10.3390/su16219472.

Full text
Abstract:
In urban areas, bicycles promote sustainable, efficient, and healthy mobility while reducing carbon emissions. Bicycle trips, especially those replacing car journeys, help reduce traffic congestion and lower emissions, contributing to decarbonising the transport sector. This study introduces a method for evaluating the bikeability of urban road networks through a multi-criteria analysis using Geographic Information Systems (GIS). Five key criteria are considered: accessibility, infrastructure, road features, environmental surroundings, and safety factors. A case study in a Portuguese city reve
APA, Harvard, Vancouver, ISO, and other styles
13

Estakhr, Javad, Mohsen Simab, and Taher Niknam. "Security Analysis of Hybrid Multi-Carrier Energy Systems." Sustainability 13, no. 6 (2021): 3102. http://dx.doi.org/10.3390/su13063102.

Full text
Abstract:
Multi-carrier energy systems (MCESs) provide collaboration between various kinds of energy carriers to supply the electricity, heating, and cooling demands. With the widespread use of MCESs in recent years, the security assessment of energy systems has attracted the attention of many contemporary researchers. However, the complexity of an MCES, including electrical, natural gas, and district heating networks, and different uncertainties imposes vast challenges to keep a safe operation energy supply. In this paper, a systematic methodology for the security analysis of MCESs is presented. For th
APA, Harvard, Vancouver, ISO, and other styles
14

Bhavani, Y., Sanjusree Vodapally, Dinesh Bokka, Harshitha Varma Muddasani, and Deepika Kasturi. "Advancements in gas leakage detection and risk assessment: a comprehensive survey." Indonesian Journal of Electrical Engineering and Computer Science 39, no. 1 (2025): 614. https://doi.org/10.11591/ijeecs.v39.i1.pp614-624.

Full text
Abstract:
Gas leakage is the main problem that harms the environment, infrastructure and public safety. Technology is increasing rapidly nowadays. So, there must be advancements in the methods used. Many methods have been come across to solve this problem. This survey paper explores various methods and technology used to solve the problem. Many methodologies have been suggested to reduce the risk of gas leaks and improve detection systems. It investigates cutting-edge models for estimating the effects of liquefied natured gas (LNG) leakage accidents, comprehensive wireless sensor network (WSN) is set up
APA, Harvard, Vancouver, ISO, and other styles
15

Song, Ki-Han, Ha-Jeong Lee, and Wonho Suh. "A Vulnerability Index for Multimodal Transportation Networks: The Case of Korea." Applied Sciences 15, no. 15 (2025): 8201. https://doi.org/10.3390/app15158201.

Full text
Abstract:
This study aimed to assess the vulnerability of transportation networks and identify critical nodes and regions within a multimodal transportation system. While previous research has predominantly focused on centrality measures to evaluate node importance from an accessibility perspective, this study emphasizes the need to evaluate network vulnerability comprehensively in response to rapid socioeconomic changes. We propose a vulnerability function that integrates network topology and connectivity. First, we defined the vulnerability of individual nodes and regional clusters. Second, we develop
APA, Harvard, Vancouver, ISO, and other styles
16

Park, Junbeom, Taehoon Eom, Hyungeun Kim, Hyeonsu Park, Zizung Yoon, and Jongsou Park. "Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks." Applied Sciences 15, no. 5 (2025): 2751. https://doi.org/10.3390/app15052751.

Full text
Abstract:
The rapid expansion of satellite networks has enabled the widespread deployment of satellite-based services across various sectors. However, these networks often prioritize cost-effectiveness over security considerations, leading to inherent architectural vulnerabilities. The complex architecture, comprising heterogeneous devices, operating systems, and communication protocols, exacerbates security risks and broadens the attack surface. Attackers can exploit these threat vectors to compromise system availability and data integrity. Prior research has primarily focused on specific security impr
APA, Harvard, Vancouver, ISO, and other styles
17

Palko, Dmytro, and Larysa Myrutenko. "METHOD OF COMPREHENSIVE CYBERSECURITY RISKS ASSESSMENT IN DISTRIBUTED INFORMATION SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 487–502. https://doi.org/10.28925/2663-4023.2024.26.731.

Full text
Abstract:
Cybersecurity risk assessment and analysis is an important element for building an effective information security management system. The high complexity and scalability of the architecture of modern distributed systems, the heterogeneity of equipment and infrastructure, as well as constant changes in the configuration and scaling of the environment give rise to a number of problems related to the collection and analysis of information for risk assessment, the need for operational processing of large arrays of complex in structure and heterogeneous in nature data coming from differentiated secu
APA, Harvard, Vancouver, ISO, and other styles
18

Meteleva, M. A. "DESIGN OF ENTREPRENEURIAL NETWORKS: EVALUATION OF THE NETWORK POTENTIAL IN RUSSIAN ARCTIC." Север и рынок: формирование экономического порядка 69, no. 3/2020 (2020): 56–71. http://dx.doi.org/10.37614/2220-802x.2.2020.69.004.

Full text
Abstract:
The article establishes the relationship between the function of sustainable economic growth in the informational productivity paradigm, which is the basis of the knowledge economy, and the modern interpretation of the economic content of entrepreneurship, which made it possible to draw a conclusion about the system-forming role of entrepreneurship in the formation of new socio-economic relations.In this regard, a refined definition of entrepreneurship based on the distinctive characteristics of its economic content is given. It is concluded that the new properties of informational socio-econo
APA, Harvard, Vancouver, ISO, and other styles
19

Pierce, Gregory, Grace Harrison, Lena Schlichting, and Laura Landes. "Closing US Drinking Water Quality Gaps: The Role of Comprehensive Assessment." Journal AWWA 116, no. 7 (2024): 28–35. http://dx.doi.org/10.1002/awwa.2317.

Full text
Abstract:
Key TakeawaysCommunity water systems (CWSs) underpin the US water supply network; the 2021 Bipartisan Infrastructure Law (BIL) made historic investments to improve CWS regulatory compliance.Recognizing the need for a nationwide assessment of regulatory compliance to inform BIL funding priorities, two policy organization partners released a “Roadmap” report.The Roadmap projects the needs of such a local system assessment at a national scale and offers solutions; its layered, feasible, and effective recommendations support equitable water access.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhou, Liang Sheng, Zhen Dong Tan, and Wei Guo Wu. "Study on Quality Management of Logistics Equipment Systems." Advanced Materials Research 662 (February 2013): 993–98. http://dx.doi.org/10.4028/www.scientific.net/amr.662.993.

Full text
Abstract:
The research and manufacture of the military logistics equipment systems always brings problems in quality management for its complexity and particularity. To solve these problems, a analysis on equipment quality management is conducted. A comprehensive study on reliability, fault diagnosis, and risk analysis models are also performed. The reliability analysis of the system is fulfilled using a method of combined fuzzy inference and network analysis. This method solves the limitations of the traditional network analysis method, of which the result is defined for every failure mode. The abnorma
APA, Harvard, Vancouver, ISO, and other styles
21

Zardari, Shehnila, Sana Alam, Hamad Abosaq Al Salem, et al. "A Comprehensive Bibliometric Assessment on Software Testing (2016–2021)." Electronics 11, no. 13 (2022): 1984. http://dx.doi.org/10.3390/electronics11131984.

Full text
Abstract:
The research study provides a comprehensive bibliometric assessment in the field of Software Testing (ST). The dynamic evolution in the field of ST is evident from the publication rate over the last six years. The research study is carried out to provide insight into the field of ST from various research bibliometric aspects. Our methodological approach includes dividing the six-year time frame into the set of two symmetric but different periods (2016–2018) and (2019–2021) comprising a total of 75,098 records. VOSViewer is used to perform analysis with respect to collaboration network of count
APA, Harvard, Vancouver, ISO, and other styles
22

Zisiadis, Dimitris, George Thanos, Spyros Kopsidas, and George Leventakis. "STAR-TRANS Modeling Language." International Journal of Information Systems for Crisis Response and Management 5, no. 2 (2013): 45–59. http://dx.doi.org/10.4018/jiscrm.2013040104.

Full text
Abstract:
Transportation networks are open and accessible, by design, and thus vulnerable to malicious attacks. Transportation networks are integral parts of larger systems, where individual transportation networks form a network-of-networks within a defined geographical region. A security incident on an asset can propagate to new security incidents in interconnected assets of the same or different networks, resulting in cascading failures in the overall network-of-networks. The present work introduces the STAR-TRANS Modeling Language (STML) and provides a reference implementation case. STML is a featur
APA, Harvard, Vancouver, ISO, and other styles
23

Du, Zhiqiang, Haitao Yao, Yanfang Fu, Zijian Cao, Hongtao Liang, and Jinkang Ren. "Network Situation Assessment Method Based on Improved BP Neural Network." Electronics 12, no. 3 (2023): 483. http://dx.doi.org/10.3390/electronics12030483.

Full text
Abstract:
Although a software defined network (SDN) realizes the flexible configuration and centralized control of network resources, there are potential security risks and challenges. Network security situation awareness (NSSA) technology associates and integrates multi-source heterogeneous information to analyze the impact of the information on the whole network, and network security situation assessment can grasp the network security situation information in real time. However, the existing situation assessment methods have low assessment accuracy, and most of the studies focus on traditional network
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Chen, Qizhi Tang, Bo Wu, Yan Jiang, and Jingzhou Xin. "Intelligent bridge monitoring system operational status assessment using analytic network-aided triangular intuitionistic fuzzy comprehensive model." Intelligence & Robotics 5, no. 2 (2025): 378–403. https://doi.org/10.20517/ir.2025.19.

Full text
Abstract:
The extensive construction of bridge health monitoring (BHM) systems has made it challenging for the authorities to manage them centrally. The reliable operational status of BHM systems is vital to obtaining accurate monitoring data and evaluating the condition of bridges. To evaluate the operational status of these systems, this study established an assessment model that integrates the triangular intuitionistic fuzzy analytic network process (TIFANP) and the triangular intuitionistic fuzzy comprehensive evaluation (TIFCE) method. Firstly, an evaluation index system was established for the ope
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Guochang. "The Evaluation and Development of University English Teaching Quality Based on Wireless Network Artificial Intelligence." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (December 31, 2023): 77–86. http://dx.doi.org/10.61091/jcmcc117-08.

Full text
Abstract:
This study introduces a novel approach to address deficiencies in prior teaching quality assessment systems by establishing a mathematical model for evaluation. Utilizing a neural network trained via a particle swarm optimization algorithm (PSO), the method develops a BP (Backpropagation) model fine-tuned by PSO to capture the intricate relationships among diverse indicators influencing teachers’ teaching quality assessment and resulting evaluations. Empirical findings highlight the effectiveness of artificial neural networks in constructing a comprehensive evaluation framework accommodating a
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Zhize, Zhiwen Zhou, Gang Zhang, Xiaoyu Zhang, Wenjie Dong, and Yanle Liu. "Temporal Scenarios-based Assessment of Maximum Hosting Capacity of Renewable Generation in Distribution Systems Considering ANM Techniques." Journal of Physics: Conference Series 2774, no. 1 (2024): 012028. http://dx.doi.org/10.1088/1742-6596/2774/1/012028.

Full text
Abstract:
Abstract Incorporating large-scale renewable distributed generation (RDG) into the power grid introduces significant challenges associated with the indeterminacy of the power system, significantly impacting the comprehensive integration and efficient utilization of the distribution network. This underscores the imperative to investigate scientific evaluation methods and mechanisms for enhancing the RDG absorptive capacity within the distribution network. In light of the stochastic and temporal characteristics inherent to RDG, a novel approach for assessing the RDG hosting capacity within distr
APA, Harvard, Vancouver, ISO, and other styles
27

Sahitya, Kurre Sai, and C. S. R. K. Prasad. "A Methodology for a Comprehensive Evaluation of an Urban Transport Network Structure Using Geographical Information Systems (GIS)." Slovak Journal of Civil Engineering 32, no. 2 (2024): 48–57. http://dx.doi.org/10.2478/sjce-2024-0013.

Full text
Abstract:
Abstract The transportation network is the most important component of an urban infrastructure. The efficiency of a region’s transportation system can be understood by the effectiveness of its transport network arrangement. The current study employs Geographical Information Systems (GIS) to assess the structure of a transport network in various clusters of the Hyderabad Metropolitan Area (HMA). The study focuses on a thorough assessment of the transport (or) road network structure in terms of various criteria such as connectivity, accessibility, maturity, and development. The study also catego
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Shengzhi, Xiaoqi Jia, Peng Liu, and Jiwu Jing. "PEDA: Comprehensive Damage Assessment for Production Environment Server Systems." IEEE Transactions on Information Forensics and Security 6, no. 4 (2011): 1323–34. http://dx.doi.org/10.1109/tifs.2011.2162062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chambers, Flann, Giovanna Di Marzo Serugendo, and Christophe Cruz. "Autonomous Generation of a Public Transportation Network by an Agent-Based Model: Mutual Enrichment with Knowledge Graphs for Sustainable Urban Mobility." Sustainability 16, no. 20 (2024): 8907. http://dx.doi.org/10.3390/su16208907.

Full text
Abstract:
Sound planning for urban mobility is a key facet of securing a sustainable future for our urban systems, and requires the careful and comprehensive assessment of its components, such as the status of the cities’ public transportation network, and how urban planners should invest in developing it. We use agent-based modelling, a tried and true method for such endeavours, for studying the history, planned future works and possible evolution of the tram line network in the Greater Geneva region. We couple these models with knowledge graphs, in a way that both are able to mutually enrich each othe
APA, Harvard, Vancouver, ISO, and other styles
30

Zhiming, Cai, Li Daming, and Deng Lianbing. "Risk evaluation of urban rainwater system waterlogging based on neural network and dynamic hydraulic model." Journal of Intelligent & Fuzzy Systems 39, no. 4 (2020): 5661–71. http://dx.doi.org/10.3233/jifs-189045.

Full text
Abstract:
With the rapid development of urban construction and the further improvement of the degree of urbanization, despite the intensification of the drainage system construction, the problem of urban waterlogging is still showing an increasingly significant trend. In this paper, the authors analyze the risk evaluation of urban rainwater system waterlogging based on neural network and dynamic hydraulic model. This article introduces the concept of risk into the study of urban waterlogging problems, combines advanced computer simulation methods to simulate different conditions of rainwater systems, an
APA, Harvard, Vancouver, ISO, and other styles
31

Mahmood K. Al-Obaidi, Husam M. Al-Faris, and Raghdah H. Al-Sherif. "A Comprehensive Evaluation Study for the Maintenance Management System of Roadways: A Review." Journal of AL-Farabi for Engineering Sciences 2, no. 1 (2023): 13. http://dx.doi.org/10.59746/jfes.v2i1.61.

Full text
Abstract:
Pavement infrastructure is essential and must be protected with limited resources. For decades, industrialized nations have used Pavement Management Systems (PMS) and pavement distress assessment to examine network and project-level pavement conditions. Pavement condition models can anticipate pavement degradation, schedule maintenance, and create multi-year rehabilitation plans based on historical data. Pavement condition surveys are done annually or biannually to calibrate pavement condition models and reduce network maintenance costs. This study highlights road system deficiencies to meet t
APA, Harvard, Vancouver, ISO, and other styles
32

Odarchenko, Roman, Maksim Iavich, Giorgi Iashvili, Solomiia Fedushko, and Yuriy Syerov. "Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers." Big Data and Cognitive Computing 7, no. 4 (2023): 169. http://dx.doi.org/10.3390/bdcc7040169.

Full text
Abstract:
It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact that current 5G communication systems are incapable of fully ensuring the required quality of service and the security of transmitted data, especially in government networks that operate in the context of the Internet of Things, hostilities, hybrid warfare, and cyberwarfare. The use of 5G extends to critical infrastructure operators and special users such as law enforcement, governments, and the military. Adapting modern cellular networks to meet the specific needs of these s
APA, Harvard, Vancouver, ISO, and other styles
33

Tiwari, Shivam. "Enhancing Financial Crime Detection through Data Science-Driven Transaction Monitoring: A Comprehensive Framework for Modern Financial Institutions." International Journal of Computing and Engineering 7, no. 13 (2025): 53–63. https://doi.org/10.47941/ijce.3001.

Full text
Abstract:
Financial institutions face mounting challenges in detecting money laundering, terrorist financing, and fraudulent activities within increasingly complex global payment ecosystems. Traditional transaction monitoring systems rely heavily on static rule-based approaches that generate excessive false-positive alerts while failing to adapt to evolving criminal methodologies. The integration of advanced data science techniques, including machine learning algorithms, behavioral profiling, and network analytics, offers transformative potential for enhancing detection capabilities while improving oper
APA, Harvard, Vancouver, ISO, and other styles
34

Guo, Wei-Feng, Xiangtian Yu, Qian-Qian Shi, Jing Liang, Shao-Wu Zhang, and Tao Zeng. "Performance assessment of sample-specific network control methods for bulk and single-cell biological data analysis." PLOS Computational Biology 17, no. 5 (2021): e1008962. http://dx.doi.org/10.1371/journal.pcbi.1008962.

Full text
Abstract:
In the past few years, a wealth of sample-specific network construction methods and structural network control methods has been proposed to identify sample-specific driver nodes for supporting the Sample-Specific network Control (SSC) analysis of biological networked systems. However, there is no comprehensive evaluation for these state-of-the-art methods. Here, we conducted a performance assessment for 16 SSC analysis workflows by using the combination of 4 sample-specific network reconstruction methods and 4 representative structural control methods. This study includes simulation evaluation
APA, Harvard, Vancouver, ISO, and other styles
35

Li, Yalei. "Formative Assessment of College English Autonomous Learning Based on Fuzzy Comprehensive Evaluation Algorithm." Mobile Information Systems 2022 (July 30, 2022): 1–9. http://dx.doi.org/10.1155/2022/7772762.

Full text
Abstract:
With the rapid development of computer networks and multimedia technology, independent e-learning has become an integral part of modern education. However, the allocation of time and space for teaching and learning, the lack of instruction and guidance necessary for self-directed learning for students, and the development of e-learning are becoming increasingly problematic. Because of this, this thesis uses guided evaluation to determine the impact of improving the quality of Student learning. Firstly, under the background of college English web-based autonomous learning, this paper constructs
APA, Harvard, Vancouver, ISO, and other styles
36

Aktayeva, Alimbubi, Yerkhan Makatov, Akku Kubigenova Tulegenovna, et al. "Cybersecurity Risk Assessments within Critical Infrastructure Social Networks." Data 8, no. 10 (2023): 156. http://dx.doi.org/10.3390/data8100156.

Full text
Abstract:
Cybersecurity social networking is a new scientific and engineering discipline that was interdisciplinary in its early days, but is now transdisciplinary. The issues of reviewing and analyzing of principal tasks related to information collection, monitoring of social networks, assessment methods, and preventing and combating cybersecurity threats are, therefore, essential and pending. There is a need to design certain methods, models, and program complexes aimed at estimating risks related to the cyberspace of social networks and the support of their activities. This study considers a risk to
APA, Harvard, Vancouver, ISO, and other styles
37

Alhakami, Wajdi. "Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method." Processes 11, no. 5 (2023): 1366. http://dx.doi.org/10.3390/pr11051366.

Full text
Abstract:
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is
APA, Harvard, Vancouver, ISO, and other styles
38

Yuchen, Wang, Xu Shuxiang, and Huang Qiongfang. "A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION IN COMPUTER NETWORK." International Journal of Network Security & Its Applications (IJNSA) 7, no. 6 (2015): 01–13. https://doi.org/10.5281/zenodo.8382089.

Full text
Abstract:
Building practical and efficient intrusion detection systems in computer network is important in industrial areas today and machine learning technique provides a set of effective algorithms to detect network intrusion. To find out appropriate algorithms for building such kinds of systems, it is necessary to evaluate various types of machine learning algorithms based on specific criteria. In this paper, we propose a novel evaluation formula which incorporates 6 indexes into our comprehensive measurement, including precision, recall, root mean square error, training time, sample complexity and p
APA, Harvard, Vancouver, ISO, and other styles
39

Shivakumar MD and Mamatha N. "Applications of graph theory in cybersecurity: Network defense models." World Journal of Advanced Research and Reviews 14, no. 2 (2022): 735–43. https://doi.org/10.30574/wjarr.2022.14.2.0467.

Full text
Abstract:
Graph theory has emerged as a fundamental mathematical framework for modeling, analyzing, and securing complex network infrastructures in cybersecurity. This paper explores the comprehensive applications of graph-theoretic models in network defense systems, examining how vertices, edges, and graph properties can effectively represent network topologies, threat propagation paths, and defensive strategies. Through systematic analysis of six key areas including network topology modeling, attack graph generation, intrusion detection systems, vulnerability assessment, threat intelligence, and advan
APA, Harvard, Vancouver, ISO, and other styles
40

Anitha, L., Mohamed Rias Adnan, Nair V. P. Deepak, and Vikram V. T. Anoop. "Advancements in Automated Resume Assessment: A Comprehensive Survey." Journal of Advance Research in Mobile Computing 7, no. 1 (2024): 1–6. https://doi.org/10.5281/zenodo.14134650.

Full text
Abstract:
<em>This comprehensive survey paper delves into the cutting-edge advancements in Automatic Resume Parsing and Ranking Systems, offering an in-depth exploration of methodologies such as Word Embedding, K Nearest Neighbors (KNN), Convolutional Neural Networks (CNN), CNN-Long Short-Term Memory (CNN-LSTM), Ensemble methods, and the strategic integration of Active Questioning (ARQ) techniques. The study emphasizes the adaptability of these methods by acknowledging the importance of hybrid models that tailor the choice of methodology based on the characteristics of the given database. For instance,
APA, Harvard, Vancouver, ISO, and other styles
41

Kumar, Vikas, Mohit Mishra, Amit Kr Pathak, Dharmendra Kr Dubey, and Brahmpal Singh. "Environmental Impact Assessment using Social Network Analysis and Data Mining." Ecology, Environment and Conservation 29, no. 04 (2023): 1736–41. http://dx.doi.org/10.53550/eec.2023.v29i04.047.

Full text
Abstract:
Environmental Impact Assessment (EIA) is a crucial process for evaluating and mitigating the potential environmental impacts of human activities. Traditional EIA methods often focus on direct physical impacts, but fail to capture the complex social interactions and behaviors that contribute to environmental degradation or sustainability. In recent years, there has been a growing interest in leveraging social network analysis and data mining techniques to enhance EIA by incorporating social dynamics into the assessment process. This research abstract proposes an innovative approach that harness
APA, Harvard, Vancouver, ISO, and other styles
42

Bolkunov, A. I., M. N. Krasil’shikov, and V. V. Malyshev. "Comprehensive Assessment of the Effectiveness of Navigation Satellite Systems." Journal of Computer and Systems Sciences International 61, no. 3 (2022): 430–46. http://dx.doi.org/10.1134/s1064230722030030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.

Full text
Abstract:
Decentralized solutions, widely adopted across industries like banking, health- care, and logistics, face persistent security concerns from potential threats. This study introduces a novel decentralized vulnerability assessment using GPT-3, an artificial intelligence (AI) technology. Employing Dockerized containers for disinfecting environments and creating unique connections to the AI API service enhances system responsiveness. AI algorithms, specifically GPT-3, conduct comprehensive network scans to identify security flaws. Findings are securely distributed to network nodes, fortifying the s
APA, Harvard, Vancouver, ISO, and other styles
44

Medini, Khaled, Sophie Peillon, Martha Orellano, Stefan Wiesner, and Ang Liu. "System Modelling and Analysis to Support Economic Assessment of Product-Service Systems." Systems 9, no. 1 (2021): 6. http://dx.doi.org/10.3390/systems9010006.

Full text
Abstract:
The evolution towards more customer-centric operations within manufacturing and service industries gave rise to novel ways of value creation and delivery such as Product–Service Systems (PSS). PSS integrate tangible and intangible elements to create new values for both customers and providers. Therefore, a close collaboration is required among various actors in a value network to co-create values towards win–win gains. For companies to keep up with this pace, new decision support tools are needed to accompany PSS engineering and to adjust business models. This need is confronted with the scarc
APA, Harvard, Vancouver, ISO, and other styles
45

Zhou, Changhong, Mu Chen, Jiangtao Chen, Yu Chen, and Wenwu Chen. "A Multi-Hazard Risk Assessment Model for a Road Network Based on Neural Networks and Fuzzy Comprehensive Evaluation." Sustainability 16, no. 6 (2024): 2429. http://dx.doi.org/10.3390/su16062429.

Full text
Abstract:
The frequency of extreme weather events has increased worldwide, leading to more intense natural disasters, which pose significant threats to human life and property safety. The main form of disaster occurrence is multi-hazard coupling and multi-hazard chaining. This paper constructs a road natural disaster risk assessment model using a fuzzy comprehensive evaluation method and neural network to quantitatively analyze road disasters with multiple hazards, and provides valuable insights for the predication of road natural disaster risk. Here, ten factors, including temperature, relative humidit
APA, Harvard, Vancouver, ISO, and other styles
46

Guo, Wei-Feng, Shao-Wu Zhang, Tao Zeng, Tatsuya Akutsu, and Luonan Chen. "Network control principles for identifying personalized driver genes in cancer." Briefings in Bioinformatics 21, no. 5 (2019): 1641–62. http://dx.doi.org/10.1093/bib/bbz089.

Full text
Abstract:
Abstract To understand tumor heterogeneity in cancer, personalized driver genes (PDGs) need to be identified for unraveling the genotype–phenotype associations corresponding to particular patients. However, most of the existing driver-focus methods mainly pay attention on the cohort information rather than on individual information. Recent developing computational approaches based on network control principles are opening a new way to discover driver genes in cancer, particularly at an individual level. To provide comprehensive perspectives of network control methods on this timely topic, we f
APA, Harvard, Vancouver, ISO, and other styles
47

Kosichenko, Yuri, Oleg Baev, and Alexander Garbuz. "ASSESSMENT OF INTEGRATED RECONSTRUCTION AND MODERNIZATION IRRIGATION SYSTEMS." Melioration and Water Management 2021, no. 2 (2022): 6–11. http://dx.doi.org/10.32962/0235-2524-2021-2-6-11.

Full text
Abstract:
The purpose of the work: comprehensive reconstruction, including the reconstruction of the irrigation network and increasing water availability, increasing the efficiency (efficiency) and ensuring guaranteed receipt of agricultural products; modernization-provides for the replacement and renewal of individual elements of the GTS. To select the most appropriate option, the target function is used, taking into account the given costs for the reconstruction or modernization of the system, the profits from irrigation of agricultural crops and the indicators of the technical level of the system. Ba
APA, Harvard, Vancouver, ISO, and other styles
48

Islam, Md Tawfiqul. "A QUANTITATIVE ASSESSMENT OF SECURE NEURAL NETWORK ARCHITECTURES FOR FAULT DETECTION IN INDUSTRIAL CONTROL SYSTEMS." Review of Applied Science and Technology 02, no. 04 (2023): 01–24. https://doi.org/10.63125/3m7gbs97.

Full text
Abstract:
Industrial Control Systems (ICS) form the core infrastructure for critical sectors such as energy, water, manufacturing, and transportation, yet their increasing digital interconnectivity has exposed them to complex fault dynamics and sophisticated cyber-physical threats. Traditional fault detection mechanisms—whether rule-based or model-driven—often fail to cope with the nonlinearity, high dimensionality, and adversarial vulnerabilities prevalent in modern ICS environments. To address these limitations, this study conducts a comprehensive quantitative evaluation of secure neural network archi
APA, Harvard, Vancouver, ISO, and other styles
49

Ahasan Habib, AKM, Ahmed Imtiaz, Dhonita Tripura, et al. "Distributed denial-of-service attack detection short review: issues, challenges, and recommendations." Bulletin of Electrical Engineering and Informatics 14, no. 1 (2025): 438–46. http://dx.doi.org/10.11591/eei.v14i1.8377.

Full text
Abstract:
An attacker can attack a network in several methods when there are a lot of device connections. Distributed denial-of-service (DDoS) attacks could result from this circumstance, which could damage resources and corrupt data. Therefore, irregularity in traffic data must be detected to identify malicious behavior in a network, which is critical for maintaining the integrity of current cyber-physical systems (CPS) as well as network security. This article attempts to study and compare various approaches to detecting DDoS attacks and expresses data paths for packet filtering for high-speed network
APA, Harvard, Vancouver, ISO, and other styles
50

Petković, Miro, Igor Vujović, Nediljko Kaštelan, and Joško Šoda. "Every Vessel Counts: Neural Network Based Maritime Traffic Counting System." Sensors 23, no. 15 (2023): 6777. http://dx.doi.org/10.3390/s23156777.

Full text
Abstract:
Monitoring and counting maritime traffic is important for efficient port operations and comprehensive maritime research. However, conventional systems such as the Automatic Identification System (AIS) and Vessel Traffic Services (VTS) often do not provide comprehensive data, especially for the diverse maritime traffic in Mediterranean ports. The paper proposes a real-time vessel counting system using land-based cameras is proposed for maritime traffic monitoring in ports, such as the Port of Split, Croatia. The system consists of a YOLOv4 Convolutional Neural Network (NN), trained and validate
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!